Sciweavers

1045 search results - page 17 / 209
» The Use of Exceptions
Sort
View
ICDM
2010
IEEE
147views Data Mining» more  ICDM 2010»
14 years 7 months ago
Subgroup Discovery Meets Bayesian Networks -- An Exceptional Model Mining Approach
Whenever a dataset has multiple discrete target variables, we want our algorithms to consider not only the variables themselves, but also the interdependencies between them. We pro...
Wouter Duivesteijn, Arno J. Knobbe, Ad Feelders, M...
SEW
2006
IEEE
15 years 3 months ago
Retrenching the Purse: Finite Exception Logs, and Validating the Small
The Mondex Electronic Purse is an outstanding example of industrial scale formal refinement, and was the first verification to achieve ITSEC level E6 certification. A formal a...
Richard Banach, Michael Poppleton, Susan Stepney
72
Voted
BMCBI
2007
125views more  BMCBI 2007»
14 years 9 months ago
Statistical tests to compare motif count exceptionalities
Background: Finding over- or under-represented motifs in biological sequences is now a common task in genomics. Thanks to p-value calculation for motif counts, exceptional motifs ...
Stéphane Robin, Sophie Schbath, Vincent Van...
ATAL
2005
Springer
15 years 3 months ago
Modeling exceptions via commitment protocols
This paper develops a model for exceptions and an approach for incorporating them in commitment protocols among autonomous agents. Modeling and handling exceptions is critical for...
Ashok U. Mallya, Munindar P. Singh
CCS
2009
ACM
15 years 4 months ago
Finding bugs in exceptional situations of JNI programs
Software flaws in native methods may defeat Java’s guarantees of safety and security. One common kind of flaws in native methods results from the discrepancy on how exceptions...
Siliang Li, Gang Tan